• Tidak ada hasil yang ditemukan

CEHv6 Module 46 Securing Laptop Computers pdf pdf

N/A
N/A
Protected

Academic year: 2019

Membagikan "CEHv6 Module 46 Securing Laptop Computers pdf pdf"

Copied!
54
0
0

Teks penuh

(1)

Ethical H ackin g an d

C

t

Coun term easures

Version 6

M o d u le X LVI

M o d u le X LVI

Securin g Laptop

Com puters

(2)
(3)

Module Objective

Thi d l ill f ili i ith

• Laptop threats

L Th f S i i

This m odule will fam iliarize you with:

• Laptop Theft Statistics • Fin gerprin t Reader

• Protectin g Laptops through Face Recogn ition • Bluetooth in Laptopsp p

• Tools

• Securin g from Physical Laptop thefts • H ardware Security for Laptops

Protectin g the Sen sitive data • Protectin g the Sen sitive data

• Preven tin g Laptop Com m un ication s from Wireless Threats • Protectin g the Stolen Laptops From Bein g Used

(4)

Module Flow

Laptop threats Securin g from Physical

Laptop thefts

Laptop Theft Statistics H ardware Security for

Laptops

p p

Fin gerprin t Reader Protectin g the Sen sitive data

Protectin g Laptops through Face Recogn ition

Preven tin g Laptop Com m un ication s from Wireless Threats

Bluetooth in Laptop Protectin g the Stolen Laptops

From Bein g Used

(5)
(6)

Statistics for Stolen an d

Recovered Laptops

(7)

Statistics on Security

(8)

Percen tage of Organ ization s

(9)

Laptop Threats

Physical Security

• Crim in als target laptops for quick profits an d m isuse of the con fiden tial data

• Laptops con tain in g person al an d corporate in form ation can p p g p p be hacked by the attackers an d used for their profits

In form ation Security

• Corruptin g, destroyin g, or gain in g access to a Laptop through hackin g, m alicious program s, or social en gin eerin g

• Accessin g the data through weak passwords an d open access • Application security an d vuln erabilities to attack the

vuln erable application

• Attackin g the laptops with un en crypted data an d un protected file system s

C i h d h h bl d i

(10)

Laptop Threats (con t’d)

Wireless Security

• In terceptin g an d m on itorin g wireless traffic through various sn iffer tools an d in terception software

y

• Packet in sertion an d hijackin g attacks in to the sn iffed wireless traffic

• J am m in g is used where the attacker uses differen t wireless devices at differen t frequen cies which q creates radio frequen cy in terferen ces for an y wireless n etwork in vicin ity

• Peer to peer attacks is perform ed by usin g Ad H oc m ode

• Man in the m iddle attack

• Wi-phishin g is used by hijackers to setup an

access poin t with SSID that is used by default on m ost access poin ts

(11)

Laptop Theft

f l

l

If a laptop were lost...

• What in form ation of a strategic n ature would be disclosed? Real exam ples of this type of in form ation in clude pen din g m ergers, n ew product in tellectual property, strategies an d laun ch plan s an d previously un disclosed fin an cial

laun ch plan s, an d previously un disclosed fin an cial operatin g results

• What in form ation of a tactical n ature would be disclosed? Exam ples in clude private com pen sation in form ation , plan s for organ ization al chan ges, proposals to clien ts, an d the m yriad of sim ilar in form ation that can be gain ed from

(12)

Laptop Theft (con t’d)

If a laptop were lost...

• What in form ation about the com pan y's n etwork or

com putin g in frastructure would be revealed that would facilitate an electron ic attack?

Exam ples of this type of in form ation in clude usern am es an d passwords, dial in n um bers, IP addressin g schem es, DNS n am in g con ven tion s, ISPs used, prim ary m ail servers, an d other n etworkin g details related to con n ectin g the laptop to other n etworkin g details related to con n ectin g the laptop to the corporate or In tern et en viron m en t.

• What person al in form ation about the laptop own er can be bt i d?

(13)

Fin gerprin t Reader

Fin gerprin t Reader en ables the user to access the Fin gerprin t Reader en ables the user to access the laptop in a m ore secured an d easy way

It provides higher level of security while accessin g the data or n etwork

BioNet 2 laptop fin gerprin t reader design ed from Biom etric fin gerprin t reader is specially used for portable storage devices such as laptops an d PDAs portable storage devices such as laptops an d PDAs

It offers secured access to the application s like,

(14)

Protectin g Laptops Through Face

Recogn ition

Recogn ition

Face Recogn ition techn ology is used to access authen tication on the laptop by recogn izin g the face as the password

laptop by recogn izin g the face as the password

It takes the sn apshot of the user an d creates digital shots which serve as the password

It supports m ultiple users to allow trusted on es to access the laptop

Features:

• Advan ced Face recogn ition software via In tegrated Cam era for authen ticatin g user • On e-key recovery helps to recover operatin g

(15)

Bluetooth in Laptops

Bluetooth en ables two laptop devices to con n ect with

h h i h f bl d i

each other n egatin g the usage of cables an d wires

A Bluetooth en abled laptop tries to pair with an other

i d d l b i h k d i

in ten ded laptop but n ot with an un kn own device

The Bluetooth laptop devices create an in itialization key PIN code or passkey used for authen tication

Attacker can sn iff this session to access the data Attacker can sn iff this session to access the data

(16)
(17)

Laptop Security

Laptops can be secured physically from bein g stolen or

Laptops can be secured physically from bein g stolen or

lost by usin g security tools

(18)

Laptop Security Tools

Steel Cable Locks Laptop Tie-down Brackets

LapSafe laptop trolley

(19)

Laptop Alarm

Laptop Alarm will em it a loud alarm when ever som eon e

l

l

tries to steal your laptop

It em its the loud soun d on

• A/ C Power Rem oval • Mouse Rem oval

It em its the loud soun d on

(20)
(21)

Flexysafe

Flexysafe is the laptops safe security case Flexysafe is the laptops safe security case

(22)

Master Lock

Master Lock paten ted lock an d cable system

Features

• Locks n otebook com puter to preven t theft an d protect data

(23)

eToken

eToken represen ts the m ost effective

eToken represen ts the m ost effective

com bin ation for protectin g data on your

laptops

It is a stron g authen tication , with disk

en cryption an d boot-protection solution

A sm art card-based stron g authen tication

solution en sures PC an d laptop security

with two key com pon en ts

with two key com pon en ts

• Physical protection of the en cryption keys • User authen tication prior to en cryption key

(24)

STOP-Lock

STOP-Lock com bin es trackin g system with a lockin g

h

i

h l d

hi

m echan ism to help deter thieves

It is a highly-visible sm all m etal plate that attaches securely to

g y

p

y

the cover of the laptop

(25)

True Crypt

Free open -source disk en cryption software

Features

• Creates a virtual en crypted disk within a file an d m oun ts it as a real disk

• En crypts an en tire partition or storage • En crypts an en tire partition or storage device such as USB flash drive or hard drive

• Provides two levels of plausible

d i bili i d f

den iability, in case an adversary forces you to reveal the password

(26)
(27)

PAL PC Tracker

PAL PC tracker will track an d locate the lost or stolen com puter PAL PC tracker will track an d locate the lost or stolen com puter

It sen ds stealth sign al which in clude the user’s com puter tracing g p g details

(28)
(29)

Cryptex

Cryptex provides an un breakable, 448 -bit en cryption data storage on l t

laptops

It keeps the data safe by creatin g an en cryptin g vault on the hard drive

(30)
(31)

Dekart Private Disk Multifactor

Private Disk Multifactor is a disk en cryption program that secures fid ti l d t l t

con fiden tial data on laptops

It provides proactive protection again st viruses, Trojan s, adware, spyware an d un authorized n etwork access

spyware, an d un authorized n etwork access

Sen sitive data is n ot on ly en crypted, but are protected with Dekart's in n ovative Disk Firewall m echan ism

(32)

Laptop An ti-Theft

L t A ti Th ft i d t th h

Laptop An ti-Theft recogn izes an d traces through both in tern al an d extern al n etworks for LAN/ WAN con figuration s to pin poin t actual location of the lost or stolen laptop

On ce in stalled in visibly on your laptop system , Laptop An ti-Theft sen ds a stealth e-m ail m essage p p g con tain in g it's exact location to a prdeterm in ed e-m ail address set by the own er

(33)

In spice Trace

In spice Trace is a

location trackin g

program that em ails you

program that em ails you

the precise location of

your stolen or lost laptop

It lets you un recoverably

destroy sen sitive data in

l

t

i

f

(34)

ZTRACE GOLD

ZTRACE GOLD is an in visible software security

application that traces the location of m issin g laptops application that traces the location of m issin g laptops for recovery

It is un detectable an d un erasable on a laptop's hard drive

If the laptop is reported m issin g, a paten t pen din g process occurs for the ZTRACE Recovery Team to iden tify the com puter's exact physical locationy p p y

(35)
(36)

SecureTrieve Pro

SecureTrieve Pro is a software tool that en crypts,

d i

i i

l

fil

f

l

protects an d retrieves critical files from a lost or

stolen laptop

It autom atically retrieves critical files rem otely

from your m issin g laptop

It offers very powerful en cryption capabilities

It goes through firewalls to fin d the exact location

of your stolen laptop

(37)

XTool Laptop Tracker

XTool Laptop Tracker supports all the recovery th d I t t C ll ID WiFi W bC GPS m ethods: In tern et, Caller ID, WiFi, WebCam , GPS, Rem ote Foren sic Tools

It can n ot be detected by an ti-virus program s an d can bypass 90 % of all corporate an d person al firewalls

XTool Laptop Tracker Agen t is sm all an d uses

en cryption to tran sm it the collected data to the XTool Mon itorin g Cen ter

Mon itorin g Cen ter

(38)

XTool Laptop Tracker:

Screen shot

(39)

XTool En crypted Disk

XTool En crypted Disk is a cen trally m an aged proactive rem ote

XTool En crypted Disk is a cen trally m an aged proactive rem ote

laptop security solution

It en sures the in tellectual property, im portan t in form ation an d

con fiden tial data stored on your rem ote laptops is secure

Protect rem ote users from data security threats by en cryptin g

sen sitive in form ation an d preven tin g un authorized access to

im portan t an d con fiden tial files

p

(40)

XTool En crypted Disk:

Screen shot

(41)

XTool Asset Auditor

XTool Asset Auditor is a cen trally m an aged auditin g

service

It uses a low ban dwidth agen t to rem otely collect

in form ation about hardware com pon en ts, software

in stalled an d application usage

in stalled an d application usage

(42)
(43)

XTool Rem ote Delete

The XTool Rem ote Delete en ables users to rem otely an d

y

securely delete sen sitive data to preven t un authorized

access to im portan t an d con fiden tial files

It m in im izes data security breaches

It provides a feedback that con firm s what files were foun d

an d deleted from the target com puter

(44)

XTool Rem ote Delete:

Screen shot

(45)
(46)

Securin g from Physical Laptop

Thefts

Thefts

Use Rem ote Laptop Security to preven t access to the secured data

secured data

Use a dockin g station

• Dockin g station perm an en tly affixes the laptop to the desktop an d also locks the laptop securely at on e place

Eject the PCMCIA NIC cards when the laptop is n ot in use j p p

Use a person al firewall to the laptop

Use security gadgets like m otion detection an d alarm s to alert you when the laptop is m oved by a third party

(47)

H ardware Security for Laptops

Security cable lockin g devices fix the laptop

y

g

p

p

to an im m ovable object

Cable alarm s alert the user at the tim e of

m alicious activities

Key lock locks down the laptop to the

surface where it is m ost used

A rem ote con trol storage case is used for

the laptops to protect from thefts

(48)

Protectin g the Sen sitive Data

Use the NTFS file system which provides file level security an d protects from laptop thieves

Disable the Guest Accoun t

Ren am e the Adm in istrator Accoun t

Con sider creatin g a dum m y Adm in istrator accoun t

P t th l t l d i f b i di l d

Prevent the last logged-in user n am e from bein g displayed

En able EFS (En cryptin g File System )

Disable the In frared Port on the laptop

Backup the data before leavin g

(49)

Preven tin g Laptop Com m un ication s

from Wireless Threats

En ablin g Wired Equivalen t Privacy (WEP) / Wi-Fi Protected

A (WPA) h i l k

Access (WPA) on the wireless n etwork

MAC address con trol allows the wireless con n ection s from

d h dd i d i h fil

MAC card whose MAC address is stored in the filter

En d to en d en cryption where the con versation is in the en crypted m ode

VPN (Virtual Private Network) protects the in form ation tran sm itted over wireless lin ks

(50)

Protectin g the Stolen Laptops

from Bein g Used

from Bein g Used

Set the BIOS password which preven ts the m achin e from

ti i ith th ti h th d i i t f

con tin uin g with the operation s when the password is in correct for three con secutive attem pts

Set Login password to successfully login to the com puter Set Login password to successfully login to the com puter

En cryptin g the file system En cryptin g the file system

Use Biom etric authen tication m echan ism (such as, fin gerprin t

d f d l d

reader, face reader, retin al pattern reader etc.)

(51)

Security Tips

In stall an ti-virus software an d firewalls

Use cable locks on laptops as visual deterren ts

Use asset trackin g an d recovery software

I t i d d d t t ti In vest in advan ced data protection

Back-up valuable data on a scheduled basis

Keep laptops un n oticeable Keep laptops un n oticeable

Avoid leavin g un secured n otebooks un atten ded

En crypt your data En crypt your data

Never leave access n um bers or passwords in your carryin g case

Use alarm bells

(52)

Sum m ary

Crim in als target laptops for quick profits an d m isuse of the Crim in als target laptops for quick profits an d m isuse of the con fiden tial data

In terception an d m on itorin g wireless traffic through various sn iffer p g g tools an d in terception software

MAC address con trol allows the wireless con n ection s from MAC card whose MAC address is stored in the filter

WPA is used as an exten sive level of security for wireless LAN’s WPA is used as an exten sive level of security for wireless LAN s

Face Recogn ition techn ology is used to access the laptop by

i i h f h d

(53)
(54)

Referensi

Dokumen terkait

Penelitian ini Berjudul Faktor-Faktor Yang Mempengaruhi Pelaku UMKM (Usaha Mikro Kecil Menengah) Dalam Mengambil Keputusan Investasi Di Surabaya,yang Dimoderasi Oleh

Pra Rencana Pabrik CO 2 Cair dari Batubara dengan Proses Gasifikasi Lurgi. Dapat menimbulkan kegairahan kerja dan menjamin keselamatan

Program Studi Teknik Lingkungan, Fakultas Teknik Sipil dan Perencanaan Universitas Pembangunan Nasional”Veteran” Jawa Timur.. Mengetahui Ketua

Puji syukur penulis panjatkan kehadirat Allah SWT yang telah memberikan rahmat, hidayah serta kekuatan sehingga penulis dapat menyelesaikan skripsi ini dengan judul “

Proses pelaksanaan program tersebut dapat dikategorikan baik karena mekanisme pengelolaan maupun sarana yang ada telah digunakan sesuai dengan prosedur penggunaan

Abstract: Fundamental motor skill is still one problem by Kindergarten at Subdistric of Padang. It was seen from preliminary research data 37.92% of Kindergarten

Materi buku ini dimulai dari pengetahuan yang mendasar dari Belajar Motorik, penjelasan tentang istilah-istilah penting dari kajian Belajar Motorik, Teori pendukung

Kenyataan-kenyataan tersebut menunjukkan bahwa lembaga pendidikan khususnya swasta tidak terhindarkan dari persaingan antar lembaga pendidikan maka yang mampu